Which of the following protocols uses public-key cryptography to authenticate the remote computer?

Which of the following protocols uses public-key cryptography to authenticate the remote
computer?

Which of the following protocols uses public-key cryptography to authenticate the remote
computer?

A.
SSH

B.
Telnet

C.
SCP

D.
SSL



Leave a Reply 0

Your email address will not be published. Required fields are marked *